About your Search

20130201
20130228
Search Results 0 to 1 of about 2 (some duplicates have been removed)
into u.s. corporations hundreds of times and stealing secrets. so if those companies can't protect themselves, how can you? and a cyber security analyst cbo connected to the case, he joins us now, hi, morgan. >> hi, alisyn. >> alisyn: that's a great question. obviously, the chinese are using, i assume, some sort of sophisticated technology to hack into the department of defense or to try to. and various corporations, computer systems, but can we assume that lower level criminals are taking a page from them? >> well, actually, alisyn, let's back up. they're actually not using sophisticated systems, what they're using curiosity, social engineering. the big s method of intrusion and the way that they're compromising system is getting you to click on an attachment on an e-mail you think you have a personal interest in. that's where the foot hold starts because the code to infect your computer comes out of that pdf or that document file or attachment. >> alisyn: good to know. talk about we, even us who are not technically sophisticated the at all can protect ourselves. >> yes he. >> ali
Search Results 0 to 1 of about 2 (some duplicates have been removed)

Terms of Use (10 Mar 2001)